Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

US Military Central Command social channels hacked

by The Gurus
January 13, 2015
in Editor's News
Share on FacebookShare on Twitter

The Twitter and YouTube channels of the US Military Central Command have been suspended after they were taken over by hackers affiliated to ISIS.
According to Washington Post, data was released which did not come from Centcom’s server or social media sites and was already publicly available online. However, the hackers had control long enough to post tweets stating “AMERICAN SOLDIERS, WE ARE COMING, WATCH YOUR BACK”.
The first rogue tweet on Monday was posted about 12:30 p.m. and the account was not suspended for about another 40 minutes. The background and profile photo of the Twitter account were both changed to show an apparent militant and the phrases “CyberCaliphate” and “i love you isis”.
The Centcom YouTube page was also hacked, with two Islamic State propaganda videos added to the page and the same “CyberCaliphate” banner posted. The YouTube account was eventually “terminated due to repeated or severe violations” of YouTube’s guidelines, the website said. Central Command also maintains Facebook accounts, but it appears they were not affected.
Centcom oversees the US military campaign against the Islamic State in Iraq and Syria, and frequently posts videos of airstrikes on the same accounts. A Centcom spokesman confirmed their accounts were “compromised”, and said later that the accounts have been taken offline while the incident is investigated more.
“CENTCOM’s operation military networks were not compromised and there was no operational impact to U.S. Central Command,” a military statement said. “CENTCOM will restore service to its Twitter and YouTube accounts as quickly as possible. We are viewing this purely as a case of cyber vandalism.”
Ken Westin, senior security analyst at Tripwire: “The compromise of both the Central Command Twitter and YouTube accounts is an escalation that should cause concern for the US Government. The fact they were able to compromise the accounts should force the Government to re-evaluate their security policies when it comes to social media. Google and Twitter both provide two-factor authentication, it would be interesting to know if this was deployed on these accounts, if not it would show a serious lapse in security.
“Even if military systems and devices have not been compromised, the objectives of the Cyber Caliphate are still achieved thanks to the media frenzy that the compromise and data posted generates.”
Lance Cottrell, chief scientist at Ntrepid, said: “The message this sends is that official accounts on non-official platforms are highly vulnerable. For example, in 2013 false information on an AP hacked social media account claiming there were explosions at Whitehouse caused a market flash crash.
“There was clear potential for similar harm from this kind of attack, but it was not taken advantage of. And this is unlikely to do any massive harm because there are so many other sources of information to correct it.”

FacebookTweetLinkedIn
Tags: Twitter
ShareTweet
Previous Post

Cyber security – learning from the past

Next Post

What can be learnt from the year of the breach?

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information